☆27Dec 29, 2024Updated last year
Alternatives and similar repositories for HermeScan
Users that are interested in HermeScan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆96May 4, 2025Updated 10 months ago
- ☆31May 28, 2023Updated 2 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- ☆47May 27, 2023Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- ☆73Nov 1, 2023Updated 2 years ago
- ☆26Apr 13, 2022Updated 3 years ago
- ☆72May 15, 2023Updated 2 years ago
- ☆69Jun 21, 2024Updated last year
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 5 years ago
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆23Jul 6, 2022Updated 3 years ago
- ☆20Jul 16, 2024Updated last year
- ☆239Jan 14, 2024Updated 2 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 3 years ago
- firmwalker加强版,增加了一些信息泄露关键字。☆19Mar 1, 2023Updated 3 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆54Nov 29, 2021Updated 4 years ago
- ☆23Jul 3, 2022Updated 3 years ago
- μSBS: Static Binary Sanitization of Bare-metal Embedded Devices☆33Jul 14, 2022Updated 3 years ago
- ☆40Feb 3, 2026Updated last month
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- ☆29Updated this week
- Bachelor's Thesis at Universidad de Granada (UGR)☆11Aug 27, 2022Updated 3 years ago
- angr's exploration technique to perform taint analysis☆63Mar 26, 2020Updated 5 years ago
- ☆27Jul 31, 2021Updated 4 years ago
- ☆32Mar 25, 2025Updated 11 months ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆22May 17, 2022Updated 3 years ago
- a tools to run qemu automatically for simulate firmware of IoT☆77Jul 18, 2025Updated 8 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Dec 10, 2024Updated last year
- 一键提取vxwork固件内部文件,并依据binwalk分析结果和uboot镜像内文件名偏移表,正确恢复vxwork文件名;以及实现主要bin文件寻找和函数符号表搜索提取功能☆33Nov 28, 2024Updated last year
- An Automated Vulnerability Detection System☆59Aug 22, 2016Updated 9 years ago
- Recent Paper About Bug Detection☆32Sep 27, 2019Updated 6 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- ☆11Feb 2, 2024Updated 2 years ago
- 这是一个获取任意切换libc版本和源码级别调试能力的仓库☆12Mar 13, 2020Updated 6 years ago
- Side-channel attac☆10Mar 25, 2022Updated 4 years ago
- A python library for generate ida pro files (*.idb/*.i64) in batch mode & compare executable files use bindiff in batch mode.☆32Jul 9, 2025Updated 8 months ago
- Simulate firmware with one click of firmadyne (使用 firmadyne 一键模拟固件)☆367Aug 18, 2024Updated last year